Threats that deep web possess to modern world I Pandya, H Joshi, B Patel, H Joshi International Journal for Innovative Research in Science & Technology, 140-148, 2017 | 6 | 2017 |
Threat Prediction using Ensemble Learning Algorithm to provide End-Point Security S Mehta, M Darji, H Joshi 2022 International Conference on Electronics and Renewable Systems (ICEARS …, 2022 | 4 | 2022 |
Internet of Things (IoT)-Based Distributed Denial of Service (DDoS) Attack Using COOJA Network Simulator H Joshi, D Rathod IOT with Smart Systems: Proceedings of ICTIS 2021, Volume 2, 671-677, 2022 | 3 | 2022 |
Privacy and security issues in social online networks R Patel, R Bhagat, P Modi, H Joshi National Conference on Latest Trends in Networking and Cyber Security …, 2017 | 3 | 2017 |
A Novel Intrusion Detection System based on Machine Learning for Internet of Things (IoT) Devices D Chauhan, M Shah, H Joshi 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), 427-434, 2023 | 1 | 2023 |
A Novel Approach for PE Malware Detection using Random Forest Algorithm and Prevention D Soni, D Shah, S Ramolia, H Joshi, S Mehta 2023 Second International Conference on Electronics and Renewable Systems …, 2023 | 1 | 2023 |
A Footstep to Image Deconvolution Technique for the Both Known and Unknown Blur Parameter R Chokshi, H Joshi, M Darji Information Systems for Intelligent Systems: Proceedings of ISBM 2022, 37-45, 2023 | 1 | 2023 |
Subterranean Insect based Data Reduction in Web Usage Mining using K-implies Clustering Algorithm HJ Dushyantsinh B. Rathod, Ramesh T. Prajapati International Journal of Engineering and Advanced Technology (IJEAT) 9 …, 2020 | 1* | 2020 |
SECURITY ENHANCEMENT THROUGH REDUCTION IN DDOS ATTACKS FOR IOT-BASED SMART CITIES JH VIJAYKUMAR, DRD RATHOD Gujarat Technological University, Ahmedabad, 2023 | | 2023 |
Anomaly Detection to Prevent Sensitive Data Exposure Using GMM Clustering Model S Mehta, LJ Gadhavi, H Joshi International Conference on Worldwide Computing and Its Applications, 439-450, 2023 | | 2023 |
A Survey Paper on Generic Restaurant Recommendation System through NLP Using Web Scrapping H Joshi act 2019 6 (4), 78-81, 2019 | | 2019 |
Survey Paper on vulnerability in Relation to Phishing-Based Social Engineering Attacks KAMAN Bandhaniya, RJH Joshi | | 2017 |
Threats that Deep Web Possess to Modern World IPHJM Biren, PMH Joshi | | 2017 |
Ideal Modelling of Data Mining KP Harshil Joshi IJSRD 2 (5), 530-533, 2014 | | 2014 |
Biometric Systems Authentication & Multi-Modal Biometric System HJC Pandya Signature 4, 5, 2014 | | 2014 |